Motivation and transfer in professional training: A meta-analysis of the moderating effects of knowledge type, instruction, and assessment conditions
A Gegenfurtner - Educational research review, 2011 - Elsevier
This meta-analysis (148 studies, k= 197, N= 31,718) examined the relationship between
motivation and transfer in professional training. For this purpose, motivation was …
motivation and transfer in professional training. For this purpose, motivation was …
Effects of computer support, collaboration, and time lag on performance self-efficacy and transfer of training: A longitudinal meta-analysis
This meta-analysis (29 studies, k= 33, N= 4158) examined the longitudinal development of
the relationship between performance self-efficacy and transfer before and after training. A …
the relationship between performance self-efficacy and transfer before and after training. A …
Advanced social engineering attacks
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …
effective means to attack information systems. The services used by today's knowledge …
Does training improve the detection of deception? A meta-analysis
V Hauch, SL Sporer, SW Michael… - Communication …, 2016 - journals.sagepub.com
This meta-analysis examined whether training improves detection of deception. Overall, 30
studies (22 published and 8 unpublished; control-group design) resulted in a small to …
studies (22 published and 8 unpublished; control-group design) resulted in a small to …
Towards automating social engineering using social networking sites
A growing number of people use social networking sites to foster social relationships among
each other. While the advantages of the provided services are obvious, drawbacks on a …
each other. While the advantages of the provided services are obvious, drawbacks on a …
The dark side of social networking sites: Understanding phishing risks
Abstract LinkedIn, with over 1.5 million Groups, has become a popular place for business
employees to create private groups to exchange information and communicate. Recent …
employees to create private groups to exchange information and communicate. Recent …
Effectiveness of deception detection training: A meta-analysis
JE Driskell - Psychology, Crime & Law, 2012 - Taylor & Francis
A meta-analysis was conducted to determine the overall effectiveness of deception detection
training and to identify conditions that may moderate training effectiveness. The analysis …
training and to identify conditions that may moderate training effectiveness. The analysis …
Social engineering attacks on the knowledge worker
Social engineering has become an emerging threat in virtual communities and is an
effective means to attack information systems. Today's knowledge workers make use of a …
effective means to attack information systems. Today's knowledge workers make use of a …
Social engineering in social networking sites: Affect-based model
While social engineering represents a real and ominous threat to many organizations,
companies, governments, and individuals, social networking sites (SNSs) have been …
companies, governments, and individuals, social networking sites (SNSs) have been …
Securing information assets: understanding, measuring and protecting against social engineering attacks
M Nohlberg - 2008 - diva-portal.org
Social engineering denotes, within the realm of security, a type of attack against the human
element during which the assailant induces the victim to release information or perform …
element during which the assailant induces the victim to release information or perform …